Black Friday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Mark works as a Network Security Administrator for BlueWells Inc. The company has a Windowsbased network. Mark is giving a presentation on Network security threats to the newly recruited employees of the company. His presentation is about the External threats that the company recently faced in the past. Which of the following statements are true about external threats?

Each correct answer represents a complete solution. Choose three.

A.

These are the threats that originate from outside an organization in which the attacker attempts to gain unauthorized access.

B.

These are the threats that originate from within the organization.

C.

These are the threats intended to flood a network with large volumes of access requests.

D.

These threats can be countered by implementing security controls on the perimeters of the network, such as firewalls, which limit user access to the Internet.

Which of the following algorithms produces a digital signature which is used to authenticate the bit-stream images?

A.

MD6

B.

MD5

C.

BOINIC

D.

HashClash

What is the process of detecting unauthorized access known as?

A.

Intrusion detection

B.

Misuse detection

C.

Anomaly detection

D.

Integrity detection

Which of the following commands is a Packet sniffer?

A.

tcpdump

B.

strace

C.

nmap

D.

tail

Which of the following statements are true about snort?

Each correct answer represents a complete solution. Choose all that apply.

A.

It develops a new signature to find vulnerabilities.

B.

It detects and alerts a computer user when it finds threats such as buffer overflows, stealth port scans, CGI attacks, SMB probes and NetBIOS queries, NMAP and other port scanners, well-known backdoors and system vulnerabilities, and DDoS clients.

C.

It encrypts the log file using the 256 bit AES encryption scheme algorithm.

D.

It is used as a passive trap to record the presence of traffic that should not be found on a network, such as NFS or Napster connections.

Which of the following Web attacks is performed by manipulating codes of programming languages such as SQL, Perl, Java present in the Web pages?

A.

Command injection attack

B.

Code injection attack

C.

Cross-Site Request Forgery

D.

Cross-Site Scripting attack

What is the name of the first computer virus that infected the boot sector of the MS-DOS operating system?

A.

Stoner

B.

Code Red

C.

Brain

D.

Sircam

Which of the following is an automated vulnerability assessment tool?

A.

Kismet

B.

Nessus

C.

Sniffer

D.

Snort

You work as a Network Administrator for Tech Perfect Inc. Your company has a Windows 2000- based network. You want to verify the connectivity of a host in the network. Which of the following utilities will you use?

A.

PING

B.

TELNET

C.

NETSTAT

D.

TRACERT

Which of the following methods is used by forensic investigators to acquire an image over the network in a secure manner?

A.

Linux Live CD

B.

DOS boot disk

C.

Secure Authentication for EnCase (SAFE)

D.

EnCase with a hardware write blocker

Which of the following utilities allows to view all files including invisible files and folders on a Macintosh OS X?

A.

Directory Scan

B.

Folder Scan

C.

File Scan

D.

System Scan

You work as a Network Administrator for McNeil Inc. The company's Windows 2000-based network is configured with Internet Security and Acceleration (ISA) Server 2000. You want to configure intrusion detection on the server. You find that the different types of attacks on the Intrusion Detection tab page of the IP Packet Filters Properties dialog box are disabled. What is the most likely cause?

A.

The PPTP through ISA firewall check box on the PPTP tab page of the IP Packet Filters Properties dialog box is not enabled.

B.

The Enable IP routing check box on the General tab page of the IP Packet Filters Properties dialog box is not selected.

C.

The Log packets from Allow filters check box on the Packet Filters tab page of the IP Packet Filters Properties dialog box is not enabled.

D.

The Enable Intrusion detection check box on the General tab page of the IP Packet Filters

Properties dialog box is not selected.

Which of the following are the two sub-layers present in Data Link layer of the OSI Reference model?

A.

Logical control and Link control

B.

Data control and Media Access control

C.

Machine Link control and Logical Link control

D.

Logical Link control and Media Access control

Which of the following ports can be used for IP spoofing?

A.

NNTP 119

B.

POP 110

C.

Rlogin 513

D.

Whois 43

Which of the following tools are used to determine the hop counts of an IP packet?

Each correct answer represents a complete solution. Choose two.

A.

TRACERT

B.

Ping

C.

IPCONFIG

D.

Netstat